Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3560835.3564554acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Open access

Automatic Security Assessment of GitHub Actions Workflows

Published: 08 November 2022 Publication History

Abstract

The demand for quick and reliable DevOps operations pushed distributors of repository platforms to implement workflows. Workflows allow automating code management operations directly on the repository hosting the software. However, this feature also introduces security issues that directly affect the repository, its content, and all the software supply chains in which the hosted code is involved in. Hence, an attack exploiting vulnerable workflows can affect disruptively large software ecosystems. To empirically assess the importance of this problem, in this paper, we focus on the de-facto main distributor (i.e., GitHub). We developed a security assessment methodology for GitHub Actions workflows, which are widely adopted in software supply chains. We implemented the methodology in a tool (GHAST) and applied it on 50 open-source projects. The experimental results are worrisome as they allowed identifying a total of 24,905 security issues (all reported to the corresponding stakeholders), thereby indicating that the problem is open and demands further research and investigation.

Supplementary Material

MP4 File (scored22-19.mp4)
Presentation video for scored'22 workshop

References

[1]
Giacomo Benedetti, Luca Verderame, and Alessio Merlo. 2022. Alice in (software supply) chains: risk identification and evaluation. In Quality of Information and Communications Technology. Springer International Publishing, Cham, 281--295. isbn: 978--3-031--14179--9.
[2]
Open Policy Agent contributors. 2022. Open policy agent. Retrieved July 22, 2022 from https://www.openpolicyagent.org.
[3]
Cybersecurity and Infrastructure Security Agency. 2021. Defending Against Software Supply Chain Attacks. Retrieved July 22, 2022 from https://www.cisa .gov/sites/default/files/publications/defending_against_sof tware_supply_ch ain_attacks_508_1.pdf.
[4]
European Union Agency for Cybersecurity. 2021. ENISA threat landscape for supply chain attacks. Publications Office. Retrieved July 22, 2022 from https://d ata.europa.eu/doi/10.2824/168593.
[5]
GitHub. 2022. Automatic token authentication. Retrieved July 22, 2022 from https://docs.github.com/en/actions/security-guides/automatic-token-authen tication.
[6]
GitHub. 2022. GitHub actions. Retrieved July 22, 2022 from https://docs.github .com/en/actions.
[7]
GitHub. 2022. GitHub contexts - github. Retrieved July 22, 2022 from https://d ocs.github.com/en/actions/learn-github-actions/contexts#github-context.
[8]
GitHub. 2022. GitHub contexts - secrets. Retrieved July 22, 2022 from https://d ocs.github.com/en/actions/learn-github-actions/contexts#secrets-context.
[9]
GitHub. 2022. Reusing workflows. Retrieved July 22, 2022 from https://docs.git hub.com/en/actions/using-workflows/reusing-workflows.
[10]
GitHub. 2022. Security hardening for github actions. Retrieved July 22, 2022 from https://docs.github.com/en/actions/security-guides/security-hardening -for-github-actions.
[11]
GitHub. 2022. Security hardening for GitHub actions: restricting permissions for tokens. Retrieved July 22, 2022 from https://docs.github.com/en/actions/se curity-guides/security-hardening-for-github-actions#restricting-permission s-for-tokens.
[12]
GitHub. 2022. Security hardening for GitHub actions: using secrets. Retrieved July 22, 2022 from https://docs.github.com/en/actions/security-guides/security -hardening-for-github-actions#using-secrets.
[13]
GitHub. 2022. Security hardening for github actions: using third-party actions. Retrieved July 22, 2022 from https://docs.github.com/en/actions/security-guid es/security-hardening-for-github-actions#using-third-party-actions.
[14]
GitHub. 2022. Using filters. Retrieved July 22, 2022 from https://docs.github.co m/en/actions/using-workflows/workflow-syntax-for-github-actions#usingfilters.
[15]
GNU. 2020. Bash reference manual - command substitution. https://www.gnu .org/savannah-checkouts/gnu/bash/manual/bash.html#Command-Substituti on.
[16]
GNU. 2020. Bash reference manual - here documents. https://www.gnu.org/sa vannah-checkouts/gnu/bash/manual/bash.html#Here-Documents.
[17]
Pronnoy Goswami, Saksham Gupta, Zhiyuan Li, Na Meng, and Daphne Yao. 2020. Investigating the reproducibility of npm packages. In 2020 IEEE International Conference on Software Maintenance and Evolution (ICSME), 677--681.
[18]
Trey Herr, Will Loomis, Emma Schroeder, Stewart Scott, Simon Handler, Tianjiu Zuo, and Atlantic Council of the United States. 2021. Broken trust: lessons from Sunburst. Retrieved July 22, 2022 from https://www.atlanticcouncil.org/in -depth-research-reports/report/broken-trust-lessons-from-sunburst/.
[19]
Neo4j Inc. 2022. Neo4j graph database. Retrieved July 22, 2022 from https://ne o4j.com/product/neo4j-graph-database/
[20]
Igibek Koishybayev, Aleksandr Nahapetyan, Raima Zachariah, Siddharth Muralee, Bradley Reaves, Alexandros Kapravelos, and Aravind Machiry. 2022. Characterizing the security of github CI workflows. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, (Aug. 2022), 2747--2763. isbn: 978--1--939133--31--1. https://www.usenix.org/conferenc e/usenixsecurity22/presentation/koishybayev.
[21]
Chris Lamb and Stefano Zacchiroli. 2022. Reproducible builds: increasing the integrity of software supply chains. IEEE Software, 39, 2, 62--70. /MS.2021.3073045.
[22]
Magno Logan. 2022. GitHub action runners: analyzing the environment and security in action. Retrieved July 22, 2022 from https://www.trendmicro.com/v info/us/security/news/cybercrime-and-digital-threats/github-action-runner s-analyzing-the-environment-and-security-in-action.
[23]
OWASP. 2020. OWASP Software Component Verification Standard. Retrieved July 22, 2022 from https://owasp.org/www-project-sof tware-component-verif ication-standard/.
[24]
Radware. 2021. Log4shell: critical log4j vulnerability. Retrieved July 22, 2022 from https://www.radware.com/security/threat-advisories-and-attack-repor ts/log4shell-critical-log4j-vulnerability/.
[25]
Scribe. 2022. Gitgat. Retrieved July 22, 2022 from https://github.com/scribe-pu blic/gitgat.
[26]
Thomas Segura. 2022. GitHub actions security best practices. Retrieved July 22, 2022 from https://blog.gitguardian.com/github-actions-security-cheat-sheet/.
[27]
Tinder. 2022. Gh-workflow-auditor. Retrieved July 22, 2022 from https://githu b.com/TinderSec/gh-workflow-auditor.
[28]
Santiago Torres-Arias, Hammad Afzali, Trishank Karthik Kuppusamy, Reza Curtmola, and Justin Cappos. 2019. In-toto: providing farm-to-table guarantees for bits and bytes. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, (Aug. 2019), 1393--1410. isbn: 978--1- 939133-06--9. https://www.usenix.org/conference/usenixsecurity19/presentat ion/torres-arias.
[29]
Duc-Ly Vu, Fabio Massacci, Ivan Pashchenko, Henrik Plate, and Antonino Sabetta. 2021. Lastpymile: identifying the discrepancy between sources and packages. In Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2021). Association for Computing Machinery, Athens, Greece, 780--792. isbn: 9781450385626.

Cited By

View all
  • (2024)Developers' Approaches to Software Supply Chain Security: An Interview StudyProceedings of the 2024 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses10.1145/3689944.3696160(56-66)Online publication date: 19-Nov-2024
  • (2024)On the Effectiveness of Large Language Models for GitHub WorkflowsProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3664497(1-14)Online publication date: 30-Jul-2024
  • (2024)Signing in Four Public Software Package Registries: Quantity, Quality, and Influencing Factors2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00215(1160-1178)Online publication date: 19-May-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SCORED'22: Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses
November 2022
121 pages
ISBN:9781450398855
DOI:10.1145/3560835
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 November 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. github actions
  2. software supply chain
  3. software supply chain security
  4. workflow security

Qualifiers

  • Research-article

Conference

CCS '22
Sponsor:

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)446
  • Downloads (Last 6 weeks)80
Reflects downloads up to 26 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Developers' Approaches to Software Supply Chain Security: An Interview StudyProceedings of the 2024 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses10.1145/3689944.3696160(56-66)Online publication date: 19-Nov-2024
  • (2024)On the Effectiveness of Large Language Models for GitHub WorkflowsProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3664497(1-14)Online publication date: 30-Jul-2024
  • (2024)Signing in Four Public Software Package Registries: Quantity, Quality, and Influencing Factors2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00215(1160-1178)Online publication date: 19-May-2024
  • (2024)Authentic Learning on DevOps Security with Labware: Git Hooks To Facilitate Automated Security Static Analysis2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC)10.1109/COMPSAC61105.2024.00388(2418-2423)Online publication date: 2-Jul-2024
  • (2024)Software supply chain security: a systematic literature reviewInternational Journal of Computers and Applications10.1080/1206212X.2024.239097846:10(853-867)Online publication date: 19-Aug-2024
  • (2023)ARGUSProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620628(6983-7000)Online publication date: 9-Aug-2023
  • (2023)An Empirical Study on Workflows and Security Policies in Popular GitHub Repositories2023 IEEE/ACM 1st International Workshop on Software Vulnerability (SVM)10.1109/SVM59160.2023.00006(6-9)Online publication date: May-2023
  • (2023)Data Validation for Eligibility Criteria and Death Benefit Claims for Insurance Policies2023 4th International Conference for Emerging Technology (INCET)10.1109/INCET57972.2023.10170530(1-7)Online publication date: 26-May-2023
  • (2023)A Preliminary Study of Privilege Life Cycle in Software Management Platform Automation Workflows2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)10.1109/EuroSPW59978.2023.00007(21-28)Online publication date: Jul-2023
  • (2023)On the outdatedness of workflows in the GitHub Actions ecosystemJournal of Systems and Software10.1016/j.jss.2023.111827206:COnline publication date: 1-Dec-2023

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media